BlackOS malicious web traffic managing software is on sale
Security researchers are keeping a close eye on underground cybercrime forums and are quick to spot new offerings, such as the BlackOS software package. Not to be confused …
Over 31,000 IoT devices and computers infected by cryptocoin-mining worm
A new version of the Darlloz Linux worm, which targets Internet-enabled devices such as home routers and security cameras, computers running Intel x86 architectures as well as …
Tor warns of malicious Tor browser offered on the App Store
A public plea made on Twitter by Runa A. Sandvik, a (former?) developer with The Tor Project has turned the spotlight on a still unresolved issue of an apparently fake Tor …
Fake Malaysia Airlines Flight 370 video hides a backdoor
As the search for the missing Malaysia Airlines Flight 370 nears the end of the second week, cyber crooks are diversifying the attacks against users curious to know what …
20% of all malware ever created appeared in 2013
According to the latest PandaLabs report, malware creation hit a new milestone. In 2013 alone, cyber-criminals created and distributed 20 percent of all malware that has ever …
25,000 UNIX servers hijacked by backdoor Trojan
The ESET security research team, in collaboration with CERT-Bund, the Swedish National Infrastructure for Computing and other leading agencies, has uncovered a widespread …
UK tax season threatened by phishing and malware attacks
Bitdefender has warned taxpayers to be cautious after discovering that a total of 10,000 tax-related spam emails were sent in a single day in the first week of March. The tax …
Online tool for browsing and analyzing web-based malware
Barracuda Networks launched Threatglass, an online tool for sharing, browsing and analyzing web-based malware. It allows users to graphically browse website infections by …
Mt. Gox CEO doxing was a ploy to spread Bitcoin-stealing malware
The recent hacking and defacing of the blog and Twitter account of Mt. Gox CEO Mark Karpeles, and the leaking of a 716 Mb archive file that allegedly contained trade data, …
Exploiting vulnerabilities in media players to spread advanced malware
Trusteer’s research has shown that vulnerable media players are constantly targeted by malicious actors. Since in most environments media players exist on users’ …
Rbrute Trojan hacks Wi-Fi routers to help spread Sality
Researchers from Russian AV company Dr. Web have recently analyzed a Trojan that hacks Wi-Fi routers in order to facilitate the spreading of the infamous Sality malware …
Account-hijacking Trojan spreads via Facebook messages
Private messages delivering what seems to be an image are spreading like wildfire on Facebook, as the file in question triggers the download of a Trojan that compromises the …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)